General
-
Target
a8feb481321a5d9f835b2992e890239e.exe
-
Size
874KB
-
Sample
221207-n6dt8she41
-
MD5
a8feb481321a5d9f835b2992e890239e
-
SHA1
77da18cf3e3a831d9507e4e53d191f01b5289c33
-
SHA256
5925646f5ca292b1e00a1b42b4b66cbaab222069fd0e4bcf7007a07a939e44f7
-
SHA512
769a2734abe0da330eaddf34b4cb7ef53eadd9eb32b06076b8e760b6b39da061f3117dd5f667e8afa4c0c89456414bfd206679edb954d6f902d750471a9460b9
-
SSDEEP
12288:ooQgKZ/nXt7virmWhlGLaQYIzjma919I9rws25iUC5ricmEnOQ4WWC37dktmPFum:sfnIBrH5rNLnOQ4WWEd+mPFI
Static task
static1
Behavioral task
behavioral1
Sample
a8feb481321a5d9f835b2992e890239e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8feb481321a5d9f835b2992e890239e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
DreamChaser101
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
DreamChaser101
Targets
-
-
Target
a8feb481321a5d9f835b2992e890239e.exe
-
Size
874KB
-
MD5
a8feb481321a5d9f835b2992e890239e
-
SHA1
77da18cf3e3a831d9507e4e53d191f01b5289c33
-
SHA256
5925646f5ca292b1e00a1b42b4b66cbaab222069fd0e4bcf7007a07a939e44f7
-
SHA512
769a2734abe0da330eaddf34b4cb7ef53eadd9eb32b06076b8e760b6b39da061f3117dd5f667e8afa4c0c89456414bfd206679edb954d6f902d750471a9460b9
-
SSDEEP
12288:ooQgKZ/nXt7virmWhlGLaQYIzjma919I9rws25iUC5ricmEnOQ4WWC37dktmPFum:sfnIBrH5rNLnOQ4WWEd+mPFI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-